ESIOT 5 Set With Answers
ESIOT 5 Set With Answers
ESIOT 5 Set With Answers
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : a) RFID
B : b) Sensor
C : c) Nano tech
D : d) Server
A:2
B:3
C:4
D:5
B : b) Process
C : c) System
D : d) Hardware
A : SimpleDB
B : SQL Server
C : Oracle
D : RDS
A : HTTP
B : MQTT
C : SMTP
D : CoAP
A : PIN
B : Digital certificate
C : PAN
D : Biometrics
A:1
B:2
C:3
D:4
Q.no 8. Process Specification is the ------ Step in IOT platforms Design Methodology
A : First
B : Second
C : Third
D : Four
A : IEEE 1459
B : IEEE 1451
C : IEEE 1441
D : IEEE 1414
A : Amplifier filter
B : Noise Filter
C : Round Filter
D : Frequency filter
A : a) 5
B : b) 2
C : c) 4
D : d) 3
B : Printer
C : Watch
D : Washing Machine
Q.no 13. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
Q.no 14. The entities, objects and concepts defined in the Domain Model
Specification
A : Physical Entity
B : Virtual Entity
C : Device
D : All of above
Q.no 15. Two of the most common protocols for SCADA _______________
A : DNP3
B : T101
C : Both A & B
D : IPv4
B : b) MQ Transport Telemetry
C : c) MQ Transport Things
D : d) MQ Telemetry Transport
Q.no 19. Which of the following is billing and account management service ?
C : Amazon DevPay
D : Multi-Factor Authentication
C : Hierarchical Databases
D : Distributed Databses
Q.no 21. Which of the following terms indicates that information is to be read
only by those people for whom it is intended?
A : Availability
B : Accounting
C : Integrity
D : Confidentiality
Q.no 22. The process of identifying assets and threats in an organisation is known
as
A : Threat Modeling
B : Security Auditing
C : Security Planning
D : Firewalling
Q.no 23. Rate monotonic scheduling algorithm is an example of
____________category
A : Static
B : Dynamic
C : Hybrid
D : Mixed
A : M2MXML
B : SDN
C : NFV
D : SNMP
Q.no 26. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.
A : deployment
B : characteristic
C : solution
D : service
Q.no 30. Gateway provides the connection between _____ and _____
Q.no 32. IEEE 802.15.4-Specifies physical layer and media access control for
A : WPANs
B : LR-WPANs
C : HR-PANs
D : PAN
A : Internet applications
B : Device applications
C : Wireless applications
D : Wired applications
Q.no 34. Applications using managed cloud storage are __________ as a Service Web
service.
A : Infrastructure
B : Platform
C : Software
Q.no 35. ………. Middleware include all enterprise middleware, B2B, EAI, multi-
tenant App servers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
A : Data collection
B : Data processing
C : Data communication
D : All of these
B : Realtime state
C : none of above
A : BACNet
B : MODBus
C : LRWPAN
D : WPAN
Q.no 39. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.
A : bi-directional
B : Full duplex
C : Not Secure
A : HTTP
B : REST
C : Web Socket
Q.no 42. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
A : a) WebSocket
B : b) HTTP
C : c) MQTT
D : d) CoAP
Q.no 44. Which of the following layers are defined by the ZigBee stack?
A : Transport layer
B : Physical layer.
B : shared by several organizations and supports a specific community that has shared
concerns.
Q.no 46. What is the typical range of transmission distance in a ZigBee network?
A : 5 m.
B : 50 m.
C : 500 m.
D : 5 km
B : b) 32-bit
C : c) 128-bit
A : Sensors
B : Gateways
C : Processors
D : Applications
A : Value-based verification
B : Identity-based verification
C : Name-based verification
D : Number-based verification
A : Block
B : Logical Volumes
C : Distance
D : Signals
Q.no 53. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
A : IEEE 802.16
B : IEEE 802.3
C : IEEE 802.11
D : IEEE 802.15
Q.no 54. The processor must accept and process the frame before the next frame
is called as ______________
A : XMPP
B : TCP
C : CoAP
D : MQTT
Q.no 57. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
Q.no 59. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by
A : IoT
B : WoT
Q.no 60. ……. is the direct technological ancestor of cloud computing, which also
has roots in the COW technology.
A : Pervasive computing
B : Mobile computing
C : Grid computing
D : Quantum Computing
Q.no 1. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.
A : Virtual
B : System Model
C : Attributes
D : Domain Model
A : Application
B : Physical
C : Transport
D : Session
A : System Model
B : Network Model
C : Domain Model
D : Basic Model
A : Client
B : Server
C : Process
D : Batch
B : storage options
C : device options
D : All of above
B : b) HTTP
C : c) CoAP
D : d) SPI
A : It represents by a database
A : Session
B : Event
C : Transport
A : MQ Telemetry Things
B : MQ Transport Telemetry
C : MQ Transport Things
D : MQ Telemetry Transport
Q.no 10. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
Q.no 11. The process of converting data into a format that can not be read by
another user
A : Registering
B : Locking
C : Encryption
D : Keying
Q.no 12. Which of the following system does not provision storage to most users?
A : PaaS
B : IaaS
C : CaaS
D : SaaS
A : IoT level
B : IOT BASICS
C : IOT PAYLOAD
D : IOT CHECKSUM
Q.no 15. Making the smaller and smaller things have the ability to connect and
interact.
A : a) Micro Tech
B : b) Smart tech
C : c) Nano tech
D : d) RFID
Q.no 16. How many categories of storage devices broadly exist in cloud?
A:1
B:2
C:3
D:4
A : service inputs/output
B : service endpoints
C : Network Security
D : Service Preconditions
A : Data
B : Message
C : Network
D : Device
Q.no 19. Which of the following feature is used for scaling EC2 sites ?
A : Auto Replica
B : Auto Scaling
C : Auto Ruling
Q.no 20. ______ are integrated Antenna for longe range communication
A : BC241
B : BC154
C : BC144
D : BC118
Q.no 21. AMIs are operating system running on ____ virtualisation hypervisor
A : Yen
B : Xen
C : Ben
D : Multi-Factor Authentication
Q.no 22. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).
A : Amazon Prime
C : AWS Academy
A:3
B:4
C:5
D:6
Q.no 24. Which of the following impose additional overhead on clients and offer
faster transfer?
A : Block Storage
B : File Storage
C : File Server
A : Function call
B : Procedure call
C : RPC
D : Web based
Q.no 26. Which of the following Hardware can be alone used as IoT Gateway
A : a) RaspberriPI
B : b) NodeMCU ESP8266
C : c) Arduino UNO
D : d) Both a and b
A : UNIX
B : Raspbian OS
C : MAC
D : Windows
A : Sensors
B : Actuators
C : RFID Tags
D : All of Above
Q.no 30. Which of the following factors might offset the cost of offline access in
hybrid applications?
A : Scalability
B : cost
C : ubiquitous access
Q.no 31. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device
A : Network router
B : Digital camera
C : Music player
D : All of these
Q.no 33. OSGi (Open services Gateway initiative framework) is used for
D : Option 1 and 3
Q.no 34. DHT11 sensor is used to sens which of there wollowing parameters
A : a) Temperature
B : b) Pressure
C : c) Humidity
D : d) Both a and c
B : innovation
C : inhibit change
D : change
Q.no 36. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.
A : Grid Computing
B : Data Mining
C : Cloud Computing
D : Business Intelligence
Q.no 37. Goal of SWE is creation of web-based sensor networks to make all
sensors and repositories of
C : Providing connectivity
D : Option 1 and 2
A : a) RTOS
B : b) Windows
C : c) Debian Linux
A : MTV
B : REST
C : Web Socket
A : ISO-based network
B : OSI-based network
C : ISI-OSI-based transport
D : ISO-based transport
A : IASI
B : ASI
C : AMI
D : ASTI
A : PostgreSQL
B : MariaDB
C : Oracle
Q.no 43. List out the tools or API for developing or testing web api?
B : Jersey API
C : Axis
D : All of above
A : plant data
A : a) AI
B : b) ML
C : c) IOT
D : d) Internet
Q.no 46. Which of the following is not a correct way to secure communication
layer
B : TLS/SSL
D : Firewalls
Q.no 47. The mango open source software platform for IOT and M2M has natural
fit between
A : CORBA &DOM
C : JASON &M2M
Q.no 48. Mention which markup language can be used in restful web api?
A : HTML
B:C
D : JAVA
Q.no 49. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of
A : 250 Kbits/s
B : 520 Kbits/s
C : 205 Kbits/s
D : 250 bits/s
A : a) LoRa
B : b) GSM
C : c) CDMA
D : d) LTE
A : Data Availability
B : Trust Management
C : Data Confidentiality
D : Secure Storage
A : SOA
B : EBS
C : GEC
D : Option 2 and 3
Q.no 53. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.
A : deployment
B : characteristic
C : solution
D : service
Q.no 54. WOT is
I] An applications’ platform
II] Explores the layer top of connectivity with things
III] fast prototyping, data integration and interaction with objects
A : Only III
Q.no 55. IEEE 802.15.4 is a technical standard which defines the operation of
____________
A : LR-WPANs
B : USN
C : WSN
D : Zigbee
D : Application Management
Q.no 57. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
Q.no 58. In threat modeling, what methodology used to perform risk analysis
A : DREAD
B : OWASP
C : STRIDE
D : DAR
A : Only III
A : a) AWS IoT
C : c) PTC ThingWorx
A : Template
B : model
C : view
D : Service
A : General device
B : Information
C : IoT devices
D : Object
A : Better Availability
B : Better Cost management
C : Fault Tolerance
Q.no 4. Which one is the First step in IOT Platforms Design Methodology
D : Service Specification
Q.no 5. How many virtual servers can be launch with Amazon EC2 ?
A:1
B:2
C : Infinite
D:0
A : SAS20
B : SAS70
C : SAS702
A : Online control
B : Direct control
C : Supervisory control
D : Automatic control
A : Composition Layer
B : Sharing Layer
C : Findability Layer
D : Accessibility Layer
Q.no 9. Which one is the Last step in IOT Platforms Design Methodology
A : Application Development
D : Service Specification
A : Ubuntu
C : openSIS
D : Zimbra
B : Small Instance
C : Micro Instance
A : Client-Server Architecture
B : Publish-Subscribe Architecture
A:2
B:3
C:4
D:5
A : a) Male HDMI
B : b) Female HDMI
A : a) Wireless fidelity
B : b) Wireless Flexibility
C : c) Wide Fidelity
D : d) WAN Flexibility
A : IaaS
B : SaaS
C : CaaS
D : Paas
Q.no 19. To define the information model, we first list the ------ Entities defined
A : Dynamic
B : Virtual
C : System
D : Basic
Q.no 20. In M2M/ IoT protocols the payload and hearder is very __________
A : Small
B : Big
D : Moderate
A : Cloud Computing
D : Operating System
Q.no 22. The Functional View (FV) defines the functions of the IoT systems
grouped into various ----------.
A:1
B : 10
C : 100
D : 110
A : a) Online control
B : b) Direct control
C : c) Supervisory control
D : d) Automatic control
Q.no 25. Which amongst the following is fastest Amazon Web Service ?
A : Amazon RDS
B : Amazon EC2
C : Amazon S3
D : Amazon DynamoDB
D : Option 1 and 2
A : a) Acknowledge
B : b) Analyze
C : c) Examine
D : d) Rectify
Q.no 28. Which of there following wireless technology provide Mesh Network
architecture in easiest way
A : a) Bluetooth
B : b) ZigBee
C : c) Wi-Fi
B : Easy installation.
B : shared by several organizations and supports a specific community that has shared
concerns.
Q.no 32. How many levels are present in a complex SCADA system?
A : a) 3 – levels
B : b) 5 – levels
C : c) 4 – levels
D : d) 6 – levels
B : Web Enhancement
C : Web Messaging
D : Web application
Q.no 34. ________ is used to describe a perceived, quickly growing set of web based
applications.
A : Web 1.0
B : Web 2.0
C : Web 3.5
D : Web 4.0
A : a) HTTP
B : b) CoAP
C : c) HTTPS
D : d) MQTT
A : Application Development
A : Secure Storage
D : Data Availability
A : 1)Hard RTOS
B : Soft RTOS
C : Firm RTOS
D : Embedded RTOS
Q.no 39. Range of Zigbee is low-cost and low-powered mesh network ___________
A : 10-100 meters
B : 100-1000 meters
C : 10-100 cm
D : 100-1000 cm
D : None of above
A : EBS
B : ECS
C : Cloud
D : Database
B : 3 GHz
C : 3.5 GHz
D : 2.4 GHz
Q.no 43. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
B : Highly pipelined
D : All of Above
Q.no 46. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client
B : client,AWS
C : only AWS
B : Link Layer
C : Network Layer
D : Application Layer
A : 802.15.4
B : SCADA
C : RFID
D : BACNet
A : First
B : Second
C : Third
D : Last
A : Option I and II
B : Distributed systems
C : Mobile systems
D : Super computers
A : 60 GHz
B : 2.4 GHz
C : Sub 1 GHz
D : 5 GHz
A : Physical
B : ZigBee device
C : Transport
D : IEEE 802.15.4
A : Google Map
B : MapReduce
C : MPI and OpenMP
D : Hadoop
Q.no 57. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive
A : Level1
B : Level 2
C : Level 3
D : Level 4
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.16
D : IEEE 802.15.4
Q.no 59. Which if the following is Light waight protocol used of IoT Applications
A : a) MQTT
B : b) HTTP
C : c) WebSocket
Q.no 1. Which of the following is storage data interchange interface for stored
data objects?
A : OCC
B : OCCI
C : OCMI
A : a) USB connection
B : b) Internal battery
C : c) Charger
D : d) Adapter
A : a) Software
B : b) Process
C : c) System
D : d) Hardware
A : MQ Telemetry Things
B : MQ Transport Telemetry
C : MQ Transport Things
D : MQ Telemetry Transport
Q.no 9. Which of the following impose additional overhead on clients and offer
faster transfer?
A : Block Storage
B : File Storage
C : File Server
A:4
B:3
C:5
D:6
Q.no 11. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.
A : Virtual
B : System Model
C : Attributes
D : Domain Model
B : storage options
C : device options
D : All of above
A : Network
B : Cloud
C : Devices
D : Connectivity
A : M2MXML
B : SDN
C : NFV
D : SNMP
Q.no 15. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
B : Publish – Subscribe
C : Push-Pull
D : Exclusive Pair
A : PIN
B : Digital certificate
C : PAN
D : Biometrics
Q.no 18. The entities, objects and concepts defined in the Domain Model
Specification
A : Physical Entity
B : Virtual Entity
C : Device
D : All of above
Q.no 19. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?
A : Salesforce
B : The force.com
C : Amazon
D : Cloudera
A : SSID
B : UID
C : UUID
D : ID
Q.no 21. Several instructions execution simultaneously in?
A : a) processing
B : b) parallel processing
C : c) serial processing
D : d) multitasking
A : DDL
B : XML
C : SOA
D : SODA
Q.no 24. Information Model defines the ------- of all the information in the IoT
system
A : Structure
B : service
C : Network
D : Device
A : a) Kevin Atrun
B : b) Kevin Atrhur
C : c) Kevin Ashton
D : d) Kevin Thomas
Q.no 26. ________ is the processor used by ARM7.
A : 8-bit CISC
B : 8-bit RISC
C : 32-bit CISC
D : 32-bit RISC
Q.no 27. Which one of the following is the Zigbees operating mode?
A : Beacon
B : Base
C : WiFI
D : Zigbee
A : Unidirectional
B : Bidirectional
C : both
A : a) PLC
B : b) HMI
C : c) Alarm task
D : d) I/O task
Q.no 30. The …….. has features such as offline support, canvas drawing based on
low footprint SVG graphics, GeolocationAPI, video and audio streaming support
with flash, WebStorage, CSS3 Selectors, 2D animation for mobile cloud
applications.
A : HTML5
B : HTML4
C : HTML3
D : HTML2
A : a) Arch Linux
B : b) Debain
C : c) Fedora Remix
Q.no 33. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
A : XMPP
B : HTTP
C : CoAP
D : MQTT
A : bi-directional
B : Full duplex
C : Not Secure
D : Exclusive Pair Communication
A : BACNet
B : MODBus
C : LRWPAN
D : WPAN
Q.no 37. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.
A : deployment
B : characteristic
C : solution
D : service
Q.no 38. This protocol is lightweight in nature and is ideal for connecting small
devices to constrained networks
A : MQTT
B : CoAP
C : IPv4
D : IPv6
A : a) Microsoft SQL
B : b) Postgres SQL
C : c) Mongo DB
D : None of Above
A : a) More secure
B : b) Lightweight
D : d) a and b
A : a) IEEE 802.15.4
B : b) IEEE 802.5
C : c) IEEE 802.4.13
D : d) Both a and b
Q.no 44. For constrained nodes and constrained networks in Internet of Things
which protocol is used.
A : IPv4
B : IPv6
C : CoAP
D : MQTT
A : POPMAIL
B : HTML/HTTPS
C : HTML/HTTP
D : SMTP
Q.no 46. What are the essential tight constraint/s related to the design metrics of
an embedded system
B : Physical Entity
C : Virtual Entity
D : None of Above
A : 1883
B : 8000
C : 8883
D : 8888
A : Value-based verification
B : Identity-based verification
C : Name-based verification
D : Number-based verification
B : b) MSP
C : c) AVR
D : d) ARM
Q.no 51. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
A : Block
B : Logical Volumes
C : Distance
D : Signals
Q.no 53. IaaS, PaaS and SaaS are three ……… models of cloud.
A : deployment
B : characteristic
C : solution
D : service
Q.no 54. Exclusive pair communication model can be best described as ____________
A : Bidirectional , simplex
C : Unidirectional , simplex
A : LR-WPANs
B : USN
C : WSN
D : Zigbee
D : Application Management
A : Data Availability
B : Trust Management
C : Data Confidentiality
D : Secure Storage
A : Data communication
B : Monitoring
C : Control
D : All of these
A : Composition Layer
B : Sharing Layer
C : Findability Layer
D : Accessibility Layer
A : Better Availability
C : Fault Tolerance
A : IoT level
B : IOT BASICS
C : IOT PAYLOAD
D : IOT CHECKSUM
C : Amazon DevPay
D : Multi-Factor Authentication
A : Mode service
B : State service
C : Controller Service
D : All of above
A : a) MQ Telemetry Things
B : b) MQ Transport Telemetry
C : c) MQ Transport Things
D : d) MQ Telemetry Transport
Q.no 9. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
Q.no 10. Which one is the Last step in IOT Platforms Design Methodology
A : Application Development
D : Service Specification
C : Hierarchical Databases
D : Distributed Databses
A : I2C
B : SSL
C : USART
D : TCP/IP
A : Client-Server Architecture
B : Publish-Subscribe Architecture
D : None of above
Q.no 15. Process Specification is the ------ Step in IOT platforms Design
Methodology
A : First
B : Second
C : Third
D : Four
Q.no 16. The process of identifying assets and threats in an organisation is known
as
A : Threat Modeling
B : Security Auditing
C : Security Planning
D : Firewalling
A : Function call
B : Procedure call
C : RPC
D : Web based
Q.no 18. Two of the most common protocols for SCADA _______________
A : DNP3
B : T101
C : Both A & B
D : IPv4
A : a) RFID
B : b) Sensor
C : c) Nano tech
D : d) Server
Q.no 20. Django interaction with application takes place with _____
A : Template
B : model
C : view
D : Service
Q.no 21. In 1999, Marc Benioff founded a company, which pioneered the multi-
tenant SaaS model, a new application-delivering mechanism. Which company is
that?
A : Salesforce
B : Oracle Siebel
C : SAP CRM
D : Infusionsoft
A:1
B:2
C:3
D:4
Q.no 23. Which of the following provide access for developers to charge Amazon's
customer for their purchases ?
A : FWS
B : FAS
C : FPS
B : b) User
C : c) Pi
D : d) Root
Q.no 25. How many virtual servers can be launch with Amazon EC2 ?
A:1
B:2
C : Infinite
D:0
A : Only (I)
B : Only (II)
A : Internet applications
B : Device applications
C : Wireless applications
D : Wired applications
B : Highly pipelined
D : None of Above
Q.no 29. List out the tools or API for developing or testing web api?
B : Jersey API
C : Axis
D : All of above
A : a) HTTP
B : b) CoAP
C : c) Both a and b
D : d) MQTT
A : EBS
B : ECS
C : Cloud
D : Database
A : a) MIPS
B : b) AutoBot
C : c) IoT Assistant
D : d) IoT
Q.no 33. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of
A : 250 Kbits/s
B : 520 Kbits/s
C : 205 Kbits/s
D : 250 bits/s
Q.no 34. Cloud computing is the fusion of ……..
A : First
B : Second
C : Third
D : Last
Q.no 38. What is the typical range of transmission distance in a ZigBee network?
A : 5 m.
B : 50 m.
C : 500 m.
D : 5 km
Q.no 39. What does WoT do ?
(I) Re-invent completely new standards.
(II) Reuses existing and well known standards.
A : ONLY (I)
B : ONLY (II)
D : None of above
A : Power
B : Controller
C : Scheduler
D : Package
Q.no 42. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
A : USE Cases
B : Processes
C : Views
D : Network Topology
Q.no 45. Which of there following wireless technology provide Mesh Network
architecture in easiest way
A : a) Bluetooth
B : b) ZigBee
C : c) Wi-Fi
A : a) Raspberry Pi3
B : b) Raspberry Pi Zero WH
C : c) Raspberry Pi Zero W
D : d) Raspberry Pi Zero
D : Option 1 and 2
B : DDOS
C : DOSD
D : SSOD
A : a) 900MHz
B : b) 1.2GHz
C : c) 1GHz
D : d) 500MHz
A : Sensors
B : Gateways
C : Processors
D : Applications
A : Physical
B : ZigBee device
C : Transport
D : IEEE 802.15.4
Q.no 53. From following which one is not fit for IOT Level
A : IOT LEVEL 1
B : IOT LEVEL 2
C : IOT LEVEL 3
D : IOT LEVEL 11
A : PLC
B : HMI
C : Alarm task
D : I/O task
Q.no 55. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
A : Option I and II
C : Only Option I
Q.no 57. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by
A : IoT
B : WoT
Q.no 58. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.
A : deployment
B : characteristic
C : solution
D : service
A : a) AWS IoT
C : c) PTC ThingWorx